Resources

NTT Security Monthly Threat Report - February 2018

In this report, GTIC researchers provide analysis into their reverse engineering of the Agent Tesla malware, deliver guidance on a recent Cisco ASA remote code execution vulnerability and also provide updates on APT activity. Researchers also touch on ransomware’s refusal to take a backseat to cryptocurrency mining malware.Download the report

Report

NTT Security Monthly Threat Report - January 2018

In this report, the GTIC provides insight into the latest NTT Security research covering exploit attempts on Oracle WebLogic servers and also answers some questions about the Meltdown and Spectre vulnerabilities. Researchers wrap up the report with an overview of increased Chinese cyber activity, along with interesting findings on the cybersecurity status of nuclear weapons. Download the report

Report

NTT Security Monthly Threat Report – December 2017

In December 2017, GTIC researchers took a look at the global installations of cryptocurrency mining software, as well as highlighting targets and new tactics, techniques, and procedures from Iran, as well as North Korea.Download the report

Thought Leadership / White Paper

NTT Security 2018 Security Trends and Predictions

From machine learning to IOT, cloud and DevSecOps to data security and GDPR, NTT Security experts predict what will shape the next 12 months in cybersecurityLearn more

Report

NTT Security Monthly Threat Report – November 2017

In this report, GTIC researchers publish research concerning a recent spike in IoT attacks, provide an overview of the continuing HIDDEN COBRA campaign, and give detail on how APT28 (a.k.a., Sofacy Group, Pawn Storm) is using a popular Microsoft Office feature as an attack vector.Download the report

Report

Report: NTT Security Monthly Threat Report – October 2017

NTT Security researchers take at a look at how attackers are shifting their phishing TTPs, and uncovered some interesting findings. Researchers also provide summaries into some of the biggest vulnerabilities and attack campaigns of the year, to include the recent Wi-Fi network flaw (KRACK), Bad Rabbit ransomware, as well as Dragonfly 2.0, an APT with active, ongoing attack campaigns targeting critical infrastructure.Download the report

Report

NTT Security Monthly Threat Report – September 2017

Exploit attempts against Apache took 4 out of the top 10 spots for the most exploited vulnerabilities in September, and keeping with the Apache theme, researchers took a look at what users can do about the Equifax breach. Additionally, researchers explored the very real challenges of combatting phishing attempts which crop up during and after natural disasters. Analysts round out the report by providing perspective on Dragonfly 2.0 (a.k.a., Energetic Bear).Download the report

Thought Leadership / White Paper

Securing operational technology: How vulnerable is our critical national infrastructure?

Critical infrastructure and industrial plant control systems are coming under scrutiny from both attackers and defenders. So what can we do to better protect ourselves against the threat of a serious breach?Learn Here

Solution / Service Overview

Embedded Security

Every NTT client project starts with the basic premise that the technology and the way it fits into your existing infrastructure, must be secure. We work seamlessly with our team of security experts at NTT Security, to embed security into every project.Learn More

Threat Intelligence Defined

Some threat intelligence services in the market today do not offer true intelligence – simply access to minimally analyzed data. This NTT Security whitepaper provides an introduction to the fundamentals of intelligence and, by extension, threat intelligence.Read the Whitepaper

How to Write an MSSP RFP

The document aims to assist organizations with putting together a well-written RFP that will not only ask the right questions, but also get the correct responses to make an educated decision about which provider to choose.

Thought Leadership / White Paper

Unlock the full potential of data centre virtualization with micro-segmentation

Organizations want software-defined security to help them solve critical security breaches by stopping attackers from moving laterally within the data centre.

BAMA futureproofs its security environment and moves to a managed security services partnership with NTT Security

Technical Consulting

Keeping up-to-date with new solutions and making them work securely and deliver value for your organization is tough. That's why organizations trust NTT Security to provide Technical Consulting services that meet the security challenges faced by global business today.

Business resilience is no longer just about the ability to adapt and recover from disruption, but being able to anticipate and prevent any disruption in the first instance. To achieve this, security needs to be the starting point, not an afterthought.

Security Automation

Why do many organizations have little or no automation between the multiple systems employed to keep the business safe? NTT Security will work with you to present the right use cases for security automation, identifying the solutions that provide the most value to your business.

Case study

Risk Insight Express Case Study

Multinational trading company improves security and risk insight: Working with NTT Security to identify the underlying causes of security breaches, this customer was able to decide where to prioritize implementation of controls according to the level of risk.

Strategic Consulting

NTT Security strategic consulting supports organizations seeking external advice to evolve a business-focused security strategy, to support the business to navigate the opportunities of the digital landscape.

Solution / Service Overview

Enterprise Security Program Services (ESPS)

NTT Security Enterprise Security Program Services (ESPS) are designed to ensure the Managed Security Services (MSS) are aligned to your risk, security and compliance programs and meet your service expectations.

Report

Report: NTT Security Monthly Threat Report – August 2017

In this month's report, GTIC researchers analyzed the Locky malspam campaign (lukitus) and provide insight into attack vectors which threat actors began leveraging during the month of August. Additionally, the GTIC provides brief highlights on APT28, who have set their sights on targeting Wi-Fi networks in the hospitality industry. Finally, a worrying new trend in banking Trojans is worming its way into this malware.

Solution / Service Overview

EU General Data Protection Regulation Services for US organizations

Data protection is an ongoing issue for all organizations and the countdown to global compliance with the new EU General Data Protection Regulation (GDPR) in May 2018 has begun. Wherever you are on your journey, NTT Security’s GDPR assessments will provide you with greater clarity around the impact of GDPR compliance.

Thought Leadership / White Paper

The international impact and opportunity of the General Data Protection Regulation (GDPR)

In an uncertain world, one thing international organizations can be sure about is the need to mark 25 May 2018 in their calendars. On that date, the new General Data Protection Regulation will come into effect. This will impact every organization in the world that collects or retains personal identifiable data from any European individual.

Report

Report: NTT Security Monthly Threat Report – July 2017

GTIC researchers took a look at what phase of the Cyber Kill Chain attackers spent the most time in, in addition to identifying over 525,000 hosts vulnerable to a buffer overflow vulnerability, finally providing details on a critical list of Oracle vulnerabilities.

NTT Security Services Overview

Protect yourself against the growing threat of ransomware and other malware variants

Ransomware is a very real business problem, as recent events have demonstrated. This paper looks at the rise of ransomware; the evolution of ransomware and attack methods; the cost to business; and the steps that NTT Security recommends organizations must take to mitigate the risk of attack.Download

Report

Report: NTT Security Monthly Threat Report – May 2017

WannaCry was, and is, big news. The NTT Security Monthly Threat Report for May 2017 provides practical details relating to the attack, as well as technical analysis of the underlying SMB vulnerabilities. For a detailed description of WannaCry, both from a technical perspective, as well as a practical one, get this month's threat report.